EGEE-II INFSO-RI-031688 Enabling Grids for E-sciencE www.eu-egee.org EGEE and gLite are registered trademarks Authorization Service Christoph Witzig, SWITCH.

Slides:



Advertisements
Similar presentations
INFSO-RI Enabling Grids for E-sciencE XACML and G-PBox update MWSG 14-15/09/2005 Presenter: Vincenzo Ciaschini.
Advertisements

EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Simply monitor a grid site with Nagios J.
INFSO-RI Enabling Grids for E-sciencE SA1: Cookbook (DSA1.7) Ian Bird CERN 18 January 2006.
INFSO-RI Enabling Grids for E-sciencE Logging and Bookkeeping and Job Provenance Services Ludek Matyska (CESNET) on behalf of the.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
Apr 30, 20081/11 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Apr 30, 2008 Gabriele Garzoglio.
Enabling Grids for E-sciencE EGEE-III INFSO-RI Using DIANE for astrophysics applications Ladislav Hluchy, Viet Tran Institute of Informatics Slovak.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks JRA1 summary Claudio Grandi EGEE-II JRA1.
EMI is partially funded by the European Commission under Grant Agreement RI Argus Policies Tutorial Valery Tschopp - SWITCH EGI TF Prague.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Angela Poschlad (PPS-FZK), Antonio Retico.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Next steps with EGEE EGEE training community.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Multi-level monitoring - an overview James.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Service Availability Monitoring – Status.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Argus gLite Authorization Service Status.
CEOS WGISS-21 CNES GRID related R&D activities Anne JEAN-ANTOINE PICCOLO CEOS WGISS-21 – Budapest – 2006, 8-12 May.
LCG Pilot Jobs + glexec John Gordon, STFC-RAL GDB 7 November 2007.
Glexec, SCAS & CREAM. Milestones CREAM-CE capable of large-scale direct job submission Glexec & SCAS capable of large-scale use on WN in logging only.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks gLite Authorization Service: Technical Overview.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks IPv6 test methodology Mathieu Goutelle (CNRS.
Conference name Company name INFSOM-RI Speaker name The ETICS Job management architecture EGEE ‘08 Istanbul, September 25 th 2008 Valerio Venturi.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
Trusted Virtual Machine Images a step towards Cloud Computing for HEP? Tony Cass on behalf of the HEPiX Virtualisation Working Group October 19 th 2010.
INFSO-RI Enabling Grids for E-sciencE G-PBox Auth meeting 13/9/2005 Presenter: Vincenzo Ciaschini.
EGEE-III INFSO-RI Enabling Grids for E-sciencE Antonio Retico CERN, Geneva 19 Jan 2009 PPS in EGEEIII: Some Points.
INFSO-RI Enabling Grids for E-sciencE The gLite File Transfer Service: Middleware Lessons Learned form Service Challenges Paolo.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Using GStat 2.0 for Information Validation.
EMI INFSO-RI Argus Policies in Action Valery Tschopp (SWITCH) on behalf of the Argus PT.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks New Authorization Service Christoph Witzig,
INFSO-RI Enabling Grids for E-sciencE /10/20054th EGEE Conference - Pisa1 gLite Configuration and Deployment Models JRA1 Integration.
EMI INFSO-RI Argus The EMI Authorization Service Valery Tschopp (SWITCH) Argus Product Team.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Update Authorization Service Christoph Witzig,
INFSO-RI Enabling Grids for E-sciencE Policy management and fair share in gLite Andrea Guarise HPDC 2006 Paris June 19th, 2006.
INFSO-RI Enabling Grids for E-sciencE SAML-XACML interoperability Oscar Koeroo.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The LCG interface Stefano BAGNASCO INFN Torino.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Regional Nagios Emir Imamagic /SRCE EGEE’09,
INFSO-RI Enabling Grids for E-sciencE gLite Test and Certification Effort Nick Thackray CERN.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
Sep 17, 20081/16 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Sep 17, 2008 Gabriele Garzoglio.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks OpenSAML extension library and API to support.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Configuration Data or “What should be.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Study on Authorization Christoph Witzig,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Study on Authorization Christoph Witzig,
INFSO-RI Enabling Grids for E-sciencE File Transfer Software and Service SC3 Gavin McCance – JRA1 Data Management Cluster Service.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Overview of gLite, the EGEE middleware Mike Mineter Training Outreach Education National.
EGEE-III INFSO-RI Enabling Grids for E-sciencE VO Authorization in EGEE Erwin Laure EGEE Technical Director Joint EGEE and OSG Workshop.
EMI is partially funded by the European Commission under Grant Agreement RI Argus Policies Tutorial Valery Tschopp (SWITCH) – Argus Product Team.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid is a Bazaar of Resource Providers and.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Job Management Claudio Grandi.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The new gLite Authorization Service Alberto.
INFSO-RI Enabling Grids for E-sciencE GUMS vs. LCMAPS Oscar Koeroo.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks CREAM: current status and next steps EGEE-JRA1.
Security Area Christoph Witzig (SWITCH) on behalf of John White (HIP)
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks IT ROC: Vision for EGEE III Tiziana Ferrari.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Argus gLite Authorization Service Workplan.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Simone Campana (CERN) Job Priorities: status.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Argus: command line usage and banning Christoph.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Nagios Grid Monitor E. Imamagic, SRCE OAT.
UNICORE and Argus integration Krzysztof Benedyczak ICM / UNICORE Security PT.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
Argus EMI Authorization Integration
gLite Security Overview
Global Banning List and Authorization Service
Argus Authorization Service Security Training
Argus: General Introduction
Argus The EMI Authorization Service
Presentation transcript:

EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Authorization Service Christoph Witzig, SWITCH

Enabling Grids for E-sciencE EGEE-II INFSO-RI Outline Introduction Short Description of the Service Deployment Proposal Policy for Global Banning Summary Appendix: Feature list of the service

Enabling Grids for E-sciencE EGEE-II INFSO-RI Institutions Involved CNAF HIP NIKHEF SWITCH Deployment plan –Devised together with SA1 / SA3 –Reviewed and endorsed by TMB Note abbreviation: authZ = authorization

Enabling Grids for E-sciencE EGEE-II INFSO-RI The Plan Starting point: authorization study in EGEE-II –Identified need for consistent authZ in gLite –authZ service part of the DoW for EGEE-III Based on input from SA1/SA3 decided: –EGEE-III year 1: development of service –EGEE-III year 2: deployment of service –Reason: Service should be deployed within EGEE-III Current status: –Service is expected to enter certification in first half of April

Enabling Grids for E-sciencE EGEE-II INFSO-RI Introduction: Which Problems Are We Trying to Solve? Different Services use different authorization mechanisms Some services even use internally more than one authorization framework Site administrators do not have simple debugging tools to check and understand their authorization configuration Site administrators must configure the authorization for each service at their site separately –Consequence 1: At a site, there is no single point to ban users/groups of users for the entire site –Consequence 2: many site administrators don’t know how to ban users –There should be a command line tool for banning and un- banning users at a site

Enabling Grids for E-sciencE EGEE-II INFSO-RI Introduction: Which Problems Are We Trying to Solve? There is no central grid-wide banning list to be used during incidents –Consequence: Urgent ban cannot be taken for granted during incidents Sites cannot publish their complete authorization policy to the outside world –Currently only assignment of FQANS (experience of DENY tags) –Note: Fixing this problem does not mean that sites MUST publish their authorization policy No monitoring on authorization decisions

Enabling Grids for E-sciencE EGEE-II INFSO-RI Introduction: Benefits of the Authorization Service (1/2) Main benefit within EGEE-III: –Addressing the above list of short-comings In addition: –Resistance to failure and simple means for scaling the service  Flexible deployment model  No dependency on a shared file system  High availability option –Client component is very lightweight  Small amount of code  Few dependencies (especially on WN)  Portability: support on other OS and languages easy

Enabling Grids for E-sciencE EGEE-II INFSO-RI Introduction: Benefits of the Authorization Service (2/2) In addition (cont.): Enables/eases various authorization tasks: –Banning of users (VO, WMS, site, or grid wide) –Composition of policies – CERN policy + experiment policy + CE policy + OCST policy + NGI policy=> Effective policy –Support for authorization based on more detailed information about the job, action, and execution environment –Support for authorization based on attributes other than FQAN –Support for multiple credential formats (not just X.509) –Support for multiple types of execution environments –Virtual machines, workspaces, … –Nagios plug-ins provided for monitoring of service

Enabling Grids for E-sciencE EGEE-II INFSO-RI Outline Introduction Short Description of the Service Deployment Proposal Policy for Global Banning Summary Appendix: Feature list of the service

Enabling Grids for E-sciencE EGEE-II INFSO-RI Service Components Administration Point: Formulating the rules through command line interface and/or file-based input Decision Point: Evaluating a request from a client based on the rules Enforcement Point: Thin client part and server part: all complexity in server part Runtime Execution Environment: Under which env. must I run? (UID, GID) Initial default deployment: All components on one host Initial rules: Banning unbanning Pilot job

Enabling Grids for E-sciencE EGEE-II INFSO-RI On the CE

Enabling Grids for E-sciencE EGEE-II INFSO-RI Outline Introduction Short Description of the Service Deployment Proposal Policy for Global Banning Summary Appendix: Feature list of the service

Enabling Grids for E-sciencE EGEE-II INFSO-RI Proposed Deployment Plan (1/4) Deployment during EGEE-III Adoption during EGEE-III

Enabling Grids for E-sciencE EGEE-II INFSO-RI Proposed Deployment Plan (2/4) Guiding Principle: No big bang but gradually increasing use of authZ service through six self-contained steps 1.glExec on the WN: Only change on WN is new version of glexec / LCMAPS Use of authZ service is a configuration option Installation of authZ service on one host through YAIM ALL policies are local (i.e. no remote policies) Only banning rules and enforcement of pilot job policy Note: No change to CREAM or lcg-CE (authZ policy only affects pilot jobs)

Enabling Grids for E-sciencE EGEE-II INFSO-RI Proposed Deployment Plan (3/4) 2.Grid-wide banning by OSCT OSCT offers centralized banning list to the sites Policy for this list currently under discussion (see section policy for global banning) 3.Integration into CREAM

Enabling Grids for E-sciencE EGEE-II INFSO-RI Proposed Deployment Plan (4/4) 4.Integration into WMS for Authorization Can be done in parallel with CREAM 5.Integration into WMS for Match-Making 6.Integration into Data Management AuthZ service NOT suited for access policies on large collection of individual files (e.g. ls-like commands) Unified banning to all SE of a site through Import of policy from site administration point Integration of authZ service

Enabling Grids for E-sciencE EGEE-II INFSO-RI Alternate Deployment Options Flexibility of the service allows different deployment models Proposal: –YAIM supports deployment on one single host –Alternate deployment options are initially supported by authZ development team on a case-by-case basis

Enabling Grids for E-sciencE EGEE-II INFSO-RI Outline Introduction Short Description of the Service Deployment Proposal Policy for Global Banning Summary Appendix: Feature list of the service

Enabling Grids for E-sciencE EGEE-II INFSO-RI Operational Policy Each site manages its own access policies Local site autonomy OSCT operates a central banning service (CBS) Sites SHOULD deploy CBS Sites SHOULD give CBS priority over local policies Sites SHOULD configure CBS so any ban/restore action is active in under 6 hours Time period still under discussion Grid Security Operations MUST inform VO manager whenever user/group access is changed (ban & restore) SHOULD= Obligation with escape clause Inform Grid Security Office. Currently proposed by JSPG Discussions continuing.

Enabling Grids for E-sciencE EGEE-II INFSO-RI Policy for Global Banning (Full text - currently under discussion) Each site manages its own local access policies to its resources. In addition, Grid security operations SHOULD operate a central banning service. Whenever Grid security operations bans a user or group of users, or restores their access, they MUST inform the appropriate VO Manager. Sites SHOULD deploy this central banning service and give it priority over local policies. The site implementation of the central banning service SHOULD be configured such that any ban or restore action made by Grid security operations is active at the site without a delay of more than 6 hours

Enabling Grids for E-sciencE EGEE-II INFSO-RI Outline Introduction Short Description of the Service Deployment Proposal Policy for Global Banning Summary Appendix: Feature list of the service

Enabling Grids for E-sciencE EGEE-II INFSO-RI Summary Expect service to enter certification in first half of April Gradual deployment in six self-contained steps –Initial focus on glexec on WN and OSCT ban list  Configuration option for glexec –Integration into CREAM and WMS for authorization –Integration into data management  Offers perspective to manage access to a site from one site-specific service –Longer term option for inclusion into match-making Feedback and volunteer sites for trying service out are highly welcome

Enabling Grids for E-sciencE EGEE-II INFSO-RI Further Information About the service: –authZ service design document: –Deployment plan: General EGEE grid security: –Authorization study: –gLite security: architecture: Other: –Wiki: (under development) –EGEE08 presentations:  

Enabling Grids for E-sciencE EGEE-II INFSO-RI Outline Introduction Short Description of the Service Deployment Proposal Policy for Global Banning Summary Appendix: Feature list of the service

Enabling Grids for E-sciencE EGEE-II INFSO-RI Feature List 1.Policy examples 2.Architectural features 3.Implementation features 4.Deployment features 5.Operational features (for a site admin) Note: Prio1 = within EGEE-III Prio2 = beyond EGEE-III Label: +, -, o for advantage, skeptic, neutral Some of it are features by design, others features that are aimed at

Enabling Grids for E-sciencE EGEE-II INFSO-RI Policy Examples: Banning (1/3) Banning users for a site (prio 1) –+ easy banning of users for a CE site administrator –+ banning groups of users, entire VOs, CAs, …. –o single banning point for a site (site-wide banning)  + possible  - needs integration into DM Grid-wide banning (prio 1) –+ OSCT maintains a grid-wide ban list –o sites must trust external policy VO-banning of users (prio 2) –+ VOs can ban the user without deregistering him Regional banning (prio 2) –+ regions/federations/nations can enforce banning rules

Enabling Grids for E-sciencE EGEE-II INFSO-RI Policy Examples: VO policies (2/3) VO policies (prio2) –- sites may oppose remote policies that they don’t understand –+ VO have a consistent means to communicate their policies to sites authZ users to run certain applications (prio2) –+ VOMS groups/roles as used in gLite are very limiting and don’t consider different types of applications (only admin role) –+ who is allowed to submit pilot/payload jobs + easy integration into VO specific services (prio2) –o VO schedulers? o Decoupling FQAN-shares (prio2) –Less important now (pilot jobs) –Deferred topic - how relevant is it really today?

Enabling Grids for E-sciencE EGEE-II INFSO-RI Policy Examples: DM (3/3) + use case of banning –- implementation TBD –- performance TBD –- different SE implementations (DPM, dCache, CASTOR,…) o quota –Open issue

Enabling Grids for E-sciencE EGEE-II INFSO-RI Policy Examples: Other (4/4) + Better sharing of resources (prio2) –E.g.access based on time + Better separation of responsibilities across Grid stakeholders (prio2) –+ combining different policies from the different stakeholders –+ adding new policies in a scalable way + Support for complex sites –Ex: CERN site policy vs site specific VO policy vs running 20+ CEs

Enabling Grids for E-sciencE EGEE-II INFSO-RI Architectural Features + Exposes policy of a site to the outside –+ Pre-requisite for a consistent authorization infrastructure across services –+ other services/users don’t have to second guess whether the job will be accepted –+ site has possibility for private policies –+ option of publishing policy or remote PDP invocation + High availability –+ extremely robust –+ every service component has HA –+ no single point of failure –+ no shared file system needed

Enabling Grids for E-sciencE EGEE-II INFSO-RI Implementation Features + Thin PEP client –+ no dependencies on WN ! –+ adding other language bindings is easy –+ easy to integrate into other services + Standard compliant –+ use of a powerful authZ language (XACML) (+extendable) –+ SAML2-XACML2 profile –+ support for SAML assertions built-in from the beginning  + credentials beyond PKI, VOMS SAML asssertions o Complexities of XACML hidden  + CLI tools + Good performance  o hard to get real requirements  + aim for several hundred invocations per second + Several institutions are involved –+ long-term support

Enabling Grids for E-sciencE EGEE-II INFSO-RI Deployment Features + Flexible deployment models –Service can be deployed in various modes –Default deployment model assumes installation of all components on one single host (supported by YAIM) + Gradual introduction into production infrastructure –+ no big bang –+ more services can use authZ service depending on their development cycle –+ no requirement that all sites make switch to use authZ simultaneously

Enabling Grids for E-sciencE EGEE-II INFSO-RI Operational Features (for site admin) + easy to use (command line interface) + consistent logging, support for incident handling  As defined in security command line tools + easy and simple monitoring interface  Easy to find out whether all service components work and what it does (Nagios plug-ins will be delivered as part of the service)  Command line interface + easy to troubleshoot + nagios plug-ins provided for service monitoring

Enabling Grids for E-sciencE EGEE-II INFSO-RI EES + Consistent handling authZ - scheduling within a CE + Consistent way to add new execution environments + Support for new execution environments –Virtual machines –Workspaces Is a BIG job –Hasn’t really been started yet

Enabling Grids for E-sciencE EGEE-II INFSO-RI rd Party Code Used OpenSAML / OpenWS: –Source: Shibboleth development team –User base: Shibboleth project (~20-30mio users), Danish e-gov, OpenLiberty, ClaritySecurity (National Ass. Of Realtors) Jetty: –Source: Mortbay –User base: one of the three major open source servlet containers JBossCache: (in-memory replication) –Source: JBoss / Red Hat –User base: JBoss, Shibboleth 1.3